Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
cc5f707a1a387109580c455ce3263439.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc5f707a1a387109580c455ce3263439.exe
Resource
win10v2004-20240226-en
General
-
Target
cc5f707a1a387109580c455ce3263439.exe
-
Size
86KB
-
MD5
cc5f707a1a387109580c455ce3263439
-
SHA1
2f78252a3c2b3f781e1f310a33ac88532d2dfcf3
-
SHA256
c79b6c5a8998b3fd64f00f1afce8e31ce19844ffdc081c20ba59f280ce8d0cd5
-
SHA512
22b325a593cd1743274fc0cffe1282b820fd71f6a80e459c8a5b100aaf8a425de6ba821f67b0cf91d9172cf2198019fd22fcdea9c89181b2a48dca9573b93eed
-
SSDEEP
1536:RHzCU+0hp9AjfWq/4jjn4eVG+Yb6LdcGbBGJVKrNXQwG055oIJVZ2:RTC279A7VWjnrVGl2cGbBGvK5XQwGGz
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\COMSysApp\ImagePath = "C:\\Program Files\\Common Files\\Microsoft Shared\\imwovp.exe comsysapp" regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\COMSysApp\ImagePath = "C:\\Program Files\\Common Files\\Microsoft Shared\\imwovp.exe comsysapp" regedit.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\COMSysApp\ImagePath = "C:\\Program Files\\Common Files\\Microsoft Shared\\imwovp.exe comsysapp" regedit.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation rundll32.exe -
Deletes itself 1 IoCs
pid Process 6024 rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 1176 cc5f707a1a387109580c455ce3263439.exe 5944 rundll32.exe 6024 rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\imwovp.exe rundll32.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\imwovp.exe rundll32.exe File created C:\Program Files\Common Files\Microsoft Shared\imwovp.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 5968 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1176 cc5f707a1a387109580c455ce3263439.exe 1176 cc5f707a1a387109580c455ce3263439.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe 6024 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1176 cc5f707a1a387109580c455ce3263439.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe Token: SeDebugPrivilege 6024 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1176 cc5f707a1a387109580c455ce3263439.exe 1176 cc5f707a1a387109580c455ce3263439.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1176 wrote to memory of 5944 1176 cc5f707a1a387109580c455ce3263439.exe 92 PID 1176 wrote to memory of 5944 1176 cc5f707a1a387109580c455ce3263439.exe 92 PID 1176 wrote to memory of 5944 1176 cc5f707a1a387109580c455ce3263439.exe 92 PID 5944 wrote to memory of 5968 5944 rundll32.exe 93 PID 5944 wrote to memory of 5968 5944 rundll32.exe 93 PID 5944 wrote to memory of 5968 5944 rundll32.exe 93 PID 5944 wrote to memory of 6024 5944 rundll32.exe 94 PID 5944 wrote to memory of 6024 5944 rundll32.exe 94 PID 5944 wrote to memory of 6024 5944 rundll32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc5f707a1a387109580c455ce3263439.exe"C:\Users\Admin\AppData\Local\Temp\cc5f707a1a387109580c455ce3263439.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\imwovpreg.dll",polmxhat2⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5944 -
C:\Windows\SysWOW64\regedit.exeregedit.exe -s "C:\Users\Admin\AppData\Local\Temp\imwovpreg.reg"3⤵
- Sets service image path in registry
- Runs .reg file with regedit
PID:5968
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Program Files\Common Files\Microsoft Shared\imwovp.dll",polmxhat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5dfb5b3bed1ee9f920cf81f862bc75d0b
SHA1629ede39aab71ea6a4c278df6471040da2f9aab5
SHA256b94b6820ca4c7a030bc98f85d0380fb988b756d6558f64b2e53b5a09e58a65b9
SHA512a4b9292494efed1712dfada0396f762354f417d91a720ba31752d17d57281ffa5982a34bc3226c6cd589dd62d43555efe3c720b08debc650b8d39351a1b2e021
-
Filesize
1KB
MD59a36ae7ee94700059c09ad2de9c44a3d
SHA1120b6d4ddd5b85e96b6735e8b7dcc37ff8cff9d3
SHA256629fad03f30473e38ac5957490275d575fb3887c880153c3a7dc4673c3db6f0d
SHA51212af88f0ba33b459395b3ae05afb2b6ed313912a9a4efda48cd1b45dfd1eb62ef49a0b7ea76ea54aecb52e669fa5fdb8bd70ce6261b6558b7a53a1423d31aa7b